-
Task
-
Resolution: Done
-
Blocker
-
1.5.0
-
None
This violation occurs twice for the latest 1.5 and 1.6 operator builds (probably because we updated to a fresher base image):
✕ [Violation] rpm_repos.ids_known ImageRef: quay.io/rhdh/rhdh-rhel9-operator@sha256:70471b6297f2816ebb35f05c71a9d664d0b824abfdc029c624e4baaedd8aec4d Reason: RPM repo id check failed: An RPM component in the SBOM specified an unknown or disallowed repository_id: pkg:rpm/redhat/openssl@3.2.2-6.el9_5?arch=src&checksum=sha256:b58aa63f681560c0c4716ef22de299dcfd3219fd4de4b9f0d363648c59b92f37&epoch=1&repository_id=ubi-9-baseos-source-rpms Title: All rpms have known repo ids Description: Each RPM package listed in an SBOM must specify the repository id that it comes from, and that repository id must be present in the list of known and permitted repository ids. Currently this is rule enforced only for SBOM components created by cachi2. To exclude this rule add "rpm_repos.ids_known:pkg:rpm/redhat/openssl@3.2.2-6.el9_5?arch=src&checksum=sha256:b58aa63f681560c0c4716ef22de299dcfd3219fd4de4b9f0d363648c59b92f37&epoch=1&repository_id=ubi-9-baseos-source-rpms" to the `exclude` section of the policy configuration. Solution: Ensure every rpm comes from a known and permitted repository, and that the data in the SBOM correctly records that. ✕ [Violation] rpm_repos.ids_known ImageRef: quay.io/rhdh/rhdh-rhel9-operator@sha256:70471b6297f2816ebb35f05c71a9d664d0b824abfdc029c624e4baaedd8aec4d Reason: RPM repo id check failed: An RPM component in the SBOM specified an unknown or disallowed repository_id: pkg:rpm/redhat/openssl@3.2.2-6.el9_5?arch=x86_64&checksum=sha256:adea7d3b99a23d01925632de46597f90b9934f7f92b40c28f34ff5c501c6d8a6&epoch=1&repository_id=ubi-9-baseos-rpms Title: All rpms have known repo ids Description: Each RPM package listed in an SBOM must specify the repository id that it comes from, and that repository id must be present in the list of known and permitted repository ids. Currently this is rule enforced only for SBOM components created by cachi2. To exclude this rule add "rpm_repos.ids_known:pkg:rpm/redhat/openssl@3.2.2-6.el9_5?arch=x86_64&checksum=sha256:adea7d3b99a23d01925632de46597f90b9934f7f92b40c28f34ff5c501c6d8a6&epoch=1&repository_id=ubi-9-baseos-rpms" to the `exclude` section of the policy configuration. Solution: Ensure every rpm comes from a known and permitted repository, and that the data in the SBOM correctly records that.
I assume the fix is to re-run rpm-lockfile-prototype -f Containerfile rpms.in.yaml to pull in updated pinned RPMs.
Maybe this needs to be incorporated into the sync-midstream.sh script so we're always current?